Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network asset continuous security monitoring method, system, device and storage medium

A network asset and security monitoring technology, applied in the field of Internet security, can solve the problems of high security risks of Internet platforms and difficult security risk monitoring of Internet platforms, and achieve the effect of ensuring timeliness and comprehensive monitoring information.

Active Publication Date: 2018-08-24
SANGFOR TECH INC
View PDF6 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, with the development of the Internet-based business of large organizations and the continuous increase in business complexity, the security of Internet services is also facing serious challenges. Many Internet business security assessment methods and detection methods formed during the early Internet development It is difficult to effectively monitor the security risks of the current Internet platforms, that is, the traditional Internet business security assessment methods and detection methods have been difficult to adapt to the security requirements of the current Internet development status, resulting in high security risks in many Internet platforms. Security Risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network asset continuous security monitoring method, system, device and storage medium
  • Network asset continuous security monitoring method, system, device and storage medium
  • Network asset continuous security monitoring method, system, device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0076] The embodiment of the invention discloses a method for continuous security monitoring of network assets, see figure 1 As shown, the method includes:

[0077] Step S11: Continuously monitor the exposed shadow assets in the target Internet platform, and automatically compare and analyze the currently monitored shadow assets with historical shadow assets to obtain changes in the shadow assets.

[0078] It can be understood that, in this ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a network asset continuous security monitoring method, system, device and a storage medium; the method comprises the following steps: continuously monitoring a shadowasset in an exposed state of a target Internet platform, and carrying out automated comparison analysis on the currently monitored shadow asset and a historical shadow asset, so as to obtain a changing circumstance of the shadow asset; carrying out continuous monitoring on security threats which exist in the target Internet platform, and carrying out automatic comparison analysis on the currentlydetected security threats and historical security threats to obtain a security threat changing circumstance. The monitoring information obtained in this application is more comprehensive, and it canbe ensured that the acquired shadow assets and the security threats are the information which dynamically updates in real time, ensuring the timeliness of the information; moreover, it can also be determined that the changing circumstances of the shadow assets and the security threats through a manner of automatic comparison analysis, so that a user can timely acquire newly increased security risks.

Description

Technical field [0001] The present invention relates to the field of Internet security technology, in particular to a method, system, equipment and storage medium for continuous security monitoring of network assets. Background technique [0002] At present, with the development of Internet-based services of large organizations and the continuous improvement of business complexity, the security of Internet services is also facing serious challenges. Many Internet business security assessment methods and detection methods formed in the early Internet development process have been very effective. It is difficult to effectively monitor the security risks of current Internet platforms. That is, traditional Internet business security assessment methods and detection methods have been difficult to adapt to the current Internet development status and security requirements, resulting in high levels of security in many Internet platforms. Security Risk. [0003] In summary, it can be seen ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1408H04L63/1433H04L63/1441H04L63/205H04L63/30
Inventor 庞思铭周欣王振兴王朋涛
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products